A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
ATM & Biometric Solutions: A Case Study
2019
International Journal of Experiential Learning & Case Studies
The concept of automated houses and the use of objects with artif icial intelligence were of special interest. ...
Of the various forms of scanning techniques, f ingerprint, iris, and facial have been selected as a security measure. ...
Looking into the trends of ATM security the following are observed:
Double Authentication One of the initial trends that were noted and proposed by Ganiyu et al. ...
doi:10.22555/ijelcs.v4i2.2543
fatcat:zekabwqxffacvln6krgb7tcbwe
Fingerprint Recognition based on Minutiae Information
2015
International Journal of Computer Applications
India focused on Recognition of Identity by using Fingerprint and Retina. ...
The performance of Fingerprint Recognition is totally dependent on the Fingerprint Image Quality, because Fingerprint Recognition is the processing of Digital Image. ...
It is a most popular biometric solution, refers to the automated method to confirmation the identity. One to
Importance of Fingerprint: Fingerprint is a very interesting and unique feature of the ...
doi:10.5120/21265-3862
fatcat:quo5ni7kbvfdxkzuxx3oksqtxy
Single-Qubit Optical Quantum Fingerprinting
2005
Physical Review Letters
We analyze and demonstrate the feasibility and superiority of linear optical single-qubit fingerprinting over its classical counterpart. ...
For one-qubit fingerprinting of two-bit messages, we prepare 'tetrahedral' qubit states experimentally and show that they meet the requirements for quantum fingerprinting to exceed the classical capability ...
(iv) present experimental results on the supply of fingerprint states that demonstrate the feasibility of the protocol. ...
doi:10.1103/physrevlett.95.150502
pmid:16241707
fatcat:4fyi47w2xjeyngwwwcvhsphjgm
Single-qubit optical quantum fingerprinting
2004
Quantum Communications and Quantum Imaging II
We analyze and demonstrate the feasibility and superiority of linear optical single-qubit fingerprinting over its classical counterpart. ...
For one-qubit fingerprinting of two-bit messages, we prepare "tetrahedral" qubit states experimentally and show that they meet the requirements for quantum fingerprinting to exceed the classical capability ...
(iv) present experimental results on the supply of fingerprint states that demonstrate the feasibility of the protocol. ...
doi:10.1117/12.562449
fatcat:kukxsrqzffenlc4qczr6objxfe
Multi-Factor Authentication Using Spectral Biometrics
2007
Journal of Japan Society for Fuzzy Theory and Intelligent Informatics
This paper describes the feasibility of enhancing existing biometrics technology with a spectroscopic method in order to prevent spoofing. ...
Biometrics (also known as biometry) is defined as "the identification of an individual based on biological traits, such as fingerprints, iris patterns, and facial features" [1] , and relies on what a person ...
A CCD/CMOS forms an image of the fingerprint by sensing the specular light reflectance from the valleys and the lack of reflectance at the ridges (i.e., the fingerprint image gets created from specular ...
doi:10.3156/jsoft.19.256
fatcat:pgr4j4vxbjekrpv3mzpnuegppm
Fourier domain asymmetric cryptosystem for privacy protected multimodal biometric security
[article]
2018
arXiv
pre-print
One modality of biometrics (such as face) is used as the plaintext, which is encrypted by another modality of biometrics (such as fingerprint). ...
The encrypted signatures are decrypted using the synthesized private keys and inverse complex spatial Fourier processing. Computer simulations demonstrate the feasibility of the technique proposed. ...
Simulation results verify the feasibility of the proposed cryptosystem. Figure 1 . 1 Double random phase encoding: (a) encryption algorithm, and (b) decryption algorithm. ...
arXiv:1810.07177v1
fatcat:pqzxj625lfhkjcmcsjlwagk4qa
Multi factor Authentication Model using Fingerprint Hash code and Iris Recognition
2019
Zenodo
Multi factor Authentication Model using Fingerprint Hash code and Iris Recognition by Krishna Prasad K. ...
The fingerprint image is hashed through the double folded layer and salted enough. ...
. he/she cannot break the system. The fingerprint image s hashed through the User does not need to remember anything; double folded layer and salted enough. ...
doi:10.5281/zenodo.2538228
fatcat:ikcyvsv3cfblrcfuaunwxbxb6e
Using fingerprint recognition system in a vaccine trial to avoid misclassification
2007
Bulletin of the World Health Organization
Relevant changes An optical sensor was used to scan fingerprints. The fingerprint template of each participant was used to verify his or her identity during each of eight follow-up visits. ...
All participants' identities were verified in the trial. Fingerprint recognition should become the standard technology for identification of participants in field trials. ...
Discussion We found that fingerprint scanning for verification of identity during a clinical trial was feasible, reliable, and acceptable in adults in a rural area of Viet Nam. ...
doi:10.2471/blt.06.031070
pmid:17242760
pmcid:PMC2636211
fatcat:datkbfp5afecnpiktgm5q47vk4
A STUDY ON MULTIFACTOR AUTHENTICATION MODEL USING FINGERPRINT HASH CODE AND IRIS RECOGNITION
2019
Zenodo
As soon as the identity of the human or machine is demonstrated, then human or machine is authorized to grant some services. ...
The modern research study reveals that fingerprint is not so secured like secured a password which consists of alphanumeric characters, number and special characters. ...
The fingerprint image is hashed through the double folded layer and salted enough. ...
doi:10.5281/zenodo.3407346
fatcat:emmsmbzqc5c6dlbuneq7rstbqu
DeepMasterPrints: Generating MasterPrints for Dictionary Attacks via Latent Variable Evolution
[article]
2018
arXiv
pre-print
The proposed method, referred to as Latent Variable Evolution, is based on training a Generative Adversarial Network on a set of real fingerprint images. ...
Recent research has demonstrated the vulnerability of fingerprint recognition systems to dictionary attacks based on MasterPrints. ...
To design DeepMasterPrints, there needs to be a way to feasibly search the space of fingerprint images. ...
arXiv:1705.07386v4
fatcat:gu27y5nybffgbemvfnmuh5nopm
Signal Fingerprinting in Cognitive Wireless Networks
2014
Proceedings of the 9th International Conference on Cognitive Radio Oriented Wireless Networks
., denial-of-service (DoS). This paper introduces active radio frequency fingerprinting (RFF) with double application scenario. ...
On the other hand, a node inside a network could use the same technique to exchange a public key during the setup of secure communication. ...
Scenario The main objective of these simulations was to demonstrate the feasibility of the proposed method. ...
doi:10.4108/icst.crowncom.2014.255374
dblp:conf/crowncom/SoderiDIH14
fatcat:cem6mrz6vnfcdlgz2g7h6ifcda
Multifactor Authentication Model using Fingerprint Hash code and Iris Recognition
2018
International journal of management, technology, and social science
In recent years, the usage of Iris for human identification has substantially grown due to the tremendous advantages with traditional or usual or normal authentication techniques based on private identity ...
As soon as the identity of the human or machine is demonstrated, then human or machine is authorized to grant some services. ...
The fingerprint image is hashed through the double folded layer and salted enough. ...
doi:10.47992/ijmts.2581.6012.0046
fatcat:jwclbfyt6ng27fbkgb6fwqcclu
Cancellable Multi-Biometric Template Generation Based on Arnold Cat Map and Aliasing
2022
Computers Materials & Continua
First, a 2D matrix of size 128 × 128 is created based on Arnold's Cat Map (ACM). ...
The simulation results obtained for performance evaluation show that the system is safe, reliable, and feasible as it achieves high security in the presence of noise. ...
Acknowledgement: The authors thank the researchers of Taif University for their support. They support project number (TURSP-2020/214), Taif University, Taif, Saudi Arabia. ...
doi:10.32604/cmc.2022.025902
fatcat:6zssv3psgngdhn7zgvlvkx3rmu
A new digital currency system
2021
The Central European Review of Economics and Management
So it proofs that such a system is feasible in principle. It is expected that the paper contributes to the discussion on CBDC systems. ...
The system we describe, uses modern cryptography that guarantees privacy on the one hand but that allows for traceability on the other hand. ...
This no double spending is one of the most important requirements of the system. ...
doi:10.29015/cerem.929
fatcat:l67wyiipsrhj3nompsctnm2yhm
Method and apparatus for extracting isolated speech word
1994
Journal of the Acoustical Society of America
The calculated values of voice fingerprint parameters then were passed to artificial neural networks, it was shown that using parameters values achieve high recognition rate, thus identifying the spoken ...
In order to recognize the spoken word and the person who spoke the word some estimating parameters were chosen and calculated to form voice fingerprint. ...
With a dictation system on your personal computer, on the other hand, it is feasible to ask the user to perform a hour or so of training in order to Fig. 1 : Calculating mu parameter build a recognition ...
doi:10.1121/1.408413
fatcat:4mznu5erjzah5byk6b6oypmncy
« Previous
Showing results 1 — 15 out of 10,993 results